Categories
Software Technical

How secure are the apps you use on Smart Phones

In my last post I wrote a very brief how-to on how to Capture Traffic from Smart Devices with Fiddler by making it a network proxy. I did just that and the results for a few app’s have upset me. Mainly because it exposes not only my password and user id, it exposed the content […]

Categories
How-To Software

Capture Traffic from Smart Devices with Fiddler

This method applies to any device on your network where you can change the values of the network proxy. I sought out this information with the intent to learn how secure are some of the the mobile applications I had been using day to day were. And when I’m sick with a head-cold the mind […]

Categories
News Personal

CrashPlan Features Tour: Explore Online Backup Features

Categories
How-To Software Technical

favicons of mobile devices and tablets

Yes! More on this again. Adding this post for a a few who may need more info. Apple iOS has supported touch icons, also Android also has apple-touch-icon support. For web pages that don’t specify a custom touch icon, a thumbnail screenshot of the page is used instead (iOS Devices). Android has a default icon, and some […]

Categories
Personal

QOTD: Rodney Glen King

“Can we, Can we all get along? Can we, Can we get along.” – Rodney Glen King (April 2, 1965 – June 17, 2012)

Categories
How-To Technical

Finding the Failed Hard Drive – Linux Software RAID

After discovering my software raid system had suffered from a failed disk drive it was time to locate it and replace. But the question was “Which physical disk drive failed”. I don’t have a fancy blinking light or one that changes to amber or red when something is wrong. So to locate the drive I […]